A Proposal for Facilitating Privacy-Aware Applications in Active Environments

  • Abraham Esquivel
  • Pablo A. Haya
  • Manuel García-Herranz
  • Xavier Alamán
Part of the Advances in Soft Computing book series (AINSC, volume 51)


This article analyses the nature of personal information according to privacy and proposes different privacy managing solutions for each type of information. Mainly focused on short-term information, the “Fair Trade” metaphor will be presented as a mean to control privacy in a balance between sharing and getting information. Combined with the appropriate monitoring and punitive tools we hypothesize that this balance will reduce system abuses and enrich the information services provided. Finally a context-aware Instant Messenger prototype, based on the “Fair Trade” metaphor, will be introduced to evaluate our hypothesis.


Context Information Fair Trade Personal Data Active Space Active Environment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Dey, K.A.: Understanding and Using Context. Personal Ubiquitous Computing 5(1) (2001)Google Scholar
  2. 2.
    Erickson, T., Smith, D.N., Kellogg, W.A., Laff, M., Richards, J.T., Bradner, E.: Socially Translucent Systems: Social Proxies, Persistent Conversation, and the Design of “Babble”. In: Proceedings of CHI 1999, pp. 72–79 (1999)Google Scholar
  3. 3.
    Esquivel, A., Haya, P.A., García-Herranz, M., Alamán, X.: Managing Pervasive Environment Privacy Using the “fair trade” Metaphor. In: CoopIS OTM 2007 Workshops, Vilamoura, Portugal, November 25-30. LNCS, vol. 4806, pp. 804–813. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  4. 4.
    Haya, P.A., Montoro, G., Alamán, X.: A prototype of a context-based architecture for intelligent home environments. In: Meersman, R., Tari, Z. (eds.) OTM 2004. LNCS, vol. 3290, pp. 477–491. Springer, Heidelberg (2004)Google Scholar
  5. 5.
    Hsieh, G., Tang, K.P., Low, W.Y., Hong, J.I.: Field Deployment of IMBuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual IM. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 91–108. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
    Isaacs, E., Tang, J.C., Morris, T.: Piazza: A Desktop Environment Supporting Impromptu and Planned Interactions. In: Proceedings of CSCW 1996, pp. 315–324 (1996)Google Scholar
  7. 7.
    Maes, P.: Agents that Reduce Work and Information Overload. Communications of the ACM 37(7), 31–40 (1994)CrossRefGoogle Scholar
  8. 8.
    Norman, D.: How might people interact with agents. Communications of the ACM 37(7), 68–71 (1994)CrossRefGoogle Scholar
  9. 9.
    Povey, D.: Optimistic Security: A New Access Control Paradigm. In: WNSP: New Security Paradigms Workshop. National Information Systems Security Conference (1999)Google Scholar
  10. 10.
    Roman, M., Hess, C., Cerqueira, R., Ranganathan, A., Campbell, R.H., Nahrstedt, K.: A Middleware Infrastructure for Active Spaces. IEEE Pervasive Computing, 74–83 (2003)Google Scholar
  11. 11.
    Scupelli, P., Kiesler, S., Fussell, S.R., Chen, C.: Project View IM: A Tool for Juggling Multiple Projects and Teams. In: Proceedings of ACM CHI, vol. 2, pp. 1773–1776 (2005)Google Scholar
  12. 12.
    Tang, J.C., Yankelovich, N., Begole, J., Kleek, M.V., Li, F.C., Bhalodia, J.R.: ConNexus to Awarenex: Extending awareness to mobile users. In: Proceedings of CHI 2001, pp. 221–228 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Abraham Esquivel
    • 1
  • Pablo A. Haya
    • 1
  • Manuel García-Herranz
    • 1
  • Xavier Alamán
    • 1
  1. 1.Dpto. de Ingeniería InformáticaUniversidad Autónoma de MadridMadrid 

Personalised recommendations